Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
ZjH6H6xqo7.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ZjH6H6xqo7.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\up5gphgh\up5gphgh.0.cs
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\up5gphgh\up5gphgh.cmdline
|
Unicode text, UTF-8 (with BOM) text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\up5gphgh\up5gphgh.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RES6781.tmp
|
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x492, 9 symbols, created Sun Nov 24 08:41:24 2024,
1st section name ".debug$S"
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\up5gphgh\CSCE347F25DAC914FE0BD5774A121A2513C.TMP
|
MSVC .res
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\up5gphgh\up5gphgh.out
|
Unicode text, UTF-8 (with BOM) text, with CRLF, CR line terminators
|
modified
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\ZjH6H6xqo7.exe
|
"C:\Users\user\Desktop\ZjH6H6xqo7.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\up5gphgh\up5gphgh.cmdline"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES6781.tmp"
"c:\Users\user\AppData\Local\Temp\up5gphgh\CSCE347F25DAC914FE0BD5774A121A2513C.TMP"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://sector-essay.cyou/api
|
104.21.47.136
|
||
https://sector-essay.cyou/5
|
unknown
|
||
https://sector-essay.cyou/apij
|
unknown
|
||
http://147.45.44.131/infopage/tvh53.exe
|
147.45.44.131
|
||
thicktoys.sbs
|
|||
http://147.45.44.131/infopage/tvh53.exeP
|
unknown
|
||
300snails.sbs
|
|||
https://sector-essay.cyou/apiO
|
unknown
|
||
faintbl0w.sbs
|
|||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://sector-essay.cyou/apiC
|
unknown
|
||
3xc1aimbl0w.sbs
|
|||
https://sector-essay.cyou/
|
unknown
|
||
http://147.45.44.131
|
unknown
|
||
https://sector-essay.cyou:443/apiMicrosoft
|
unknown
|
||
https://sector-essay.cyou/apie
|
unknown
|
||
https://sector-essay.cyou:443/api
|
unknown
|
There are 7 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
sector-essay.cyou
|
104.21.47.136
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.47.136
|
sector-essay.cyou
|
United States
|
||
147.45.44.131
|
unknown
|
Russian Federation
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ZjH6H6xqo7_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ZjH6H6xqo7_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ZjH6H6xqo7_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ZjH6H6xqo7_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ZjH6H6xqo7_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ZjH6H6xqo7_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ZjH6H6xqo7_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ZjH6H6xqo7_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ZjH6H6xqo7_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ZjH6H6xqo7_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ZjH6H6xqo7_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ZjH6H6xqo7_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ZjH6H6xqo7_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ZjH6H6xqo7_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
400000
|
remote allocation
|
page execute and read and write
|
||
5702000
|
heap
|
page read and write
|
||
1070000
|
heap
|
page read and write
|
||
5BAE000
|
stack
|
page read and write
|
||
1551000
|
heap
|
page read and write
|
||
1520000
|
heap
|
page read and write
|
||
105E000
|
stack
|
page read and write
|
||
5727000
|
heap
|
page read and write
|
||
101E000
|
stack
|
page read and write
|
||
5CAF000
|
direct allocation
|
page read and write
|
||
2F10000
|
heap
|
page execute and read and write
|
||
501D000
|
stack
|
page read and write
|
||
1580000
|
trusted library allocation
|
page read and write
|
||
2FC4000
|
trusted library allocation
|
page read and write
|
||
1470000
|
heap
|
page read and write
|
||
5C20000
|
direct allocation
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
582E000
|
stack
|
page read and write
|
||
5719000
|
heap
|
page read and write
|
||
5735000
|
heap
|
page read and write
|
||
3A18000
|
trusted library allocation
|
page read and write
|
||
2F98000
|
trusted library allocation
|
page read and write
|
||
139D000
|
stack
|
page read and write
|
||
BAE000
|
stack
|
page read and write
|
||
5702000
|
heap
|
page read and write
|
||
1407000
|
trusted library allocation
|
page execute and read and write
|
||
353D000
|
stack
|
page read and write
|
||
118E000
|
heap
|
page read and write
|
||
137E000
|
stack
|
page read and write
|
||
2FA0000
|
trusted library allocation
|
page read and write
|
||
FEE000
|
stack
|
page read and write
|
||
55C0000
|
heap
|
page read and write
|
||
367F000
|
stack
|
page read and write
|
||
592E000
|
stack
|
page read and write
|
||
456000
|
remote allocation
|
page execute and read and write
|
||
5CA0000
|
direct allocation
|
page read and write
|
||
5C00000
|
direct allocation
|
page read and write
|
||
55D0000
|
heap
|
page read and write
|
||
56F6000
|
heap
|
page read and write
|
||
53F9000
|
stack
|
page read and write
|
||
13C5000
|
heap
|
page read and write
|
||
1420000
|
trusted library allocation
|
page read and write
|
||
5520000
|
heap
|
page execute and read and write
|
||
551E000
|
stack
|
page read and write
|
||
11C2000
|
heap
|
page read and write
|
||
5CCA000
|
direct allocation
|
page read and write
|
||
13DD000
|
trusted library allocation
|
page execute and read and write
|
||
3985000
|
trusted library allocation
|
page read and write
|
||
15E9000
|
heap
|
page read and write
|
||
2F21000
|
trusted library allocation
|
page read and write
|
||
3988000
|
trusted library allocation
|
page read and write
|
||
122C000
|
heap
|
page read and write
|
||
15D3000
|
heap
|
page read and write
|
||
B4D000
|
stack
|
page read and write
|
||
5D10000
|
heap
|
page read and write
|
||
2F0E000
|
stack
|
page read and write
|
||
15F0000
|
heap
|
page read and write
|
||
13F7000
|
trusted library allocation
|
page execute and read and write
|
||
14DE000
|
stack
|
page read and write
|
||
3870000
|
heap
|
page read and write
|
||
5CE0000
|
direct allocation
|
page read and write
|
||
5719000
|
heap
|
page read and write
|
||
5672000
|
direct allocation
|
page read and write
|
||
1560000
|
heap
|
page read and write
|
||
AEE000
|
unkown
|
page readonly
|
||
152A000
|
heap
|
page read and write
|
||
5C70000
|
heap
|
page read and write
|
||
5724000
|
heap
|
page read and write
|
||
15F6000
|
heap
|
page read and write
|
||
161C000
|
heap
|
page read and write
|
||
EF9000
|
stack
|
page read and write
|
||
2F86000
|
trusted library allocation
|
page read and write
|
||
5630000
|
direct allocation
|
page read and write
|
||
5702000
|
heap
|
page read and write
|
||
5460000
|
heap
|
page read and write
|
||
5CAF000
|
direct allocation
|
page read and write
|
||
171F000
|
stack
|
page read and write
|
||
140B000
|
trusted library allocation
|
page execute and read and write
|
||
562E000
|
stack
|
page read and write
|
||
56DE000
|
heap
|
page read and write
|
||
5BEE000
|
stack
|
page read and write
|
||
5735000
|
heap
|
page read and write
|
||
2E8E000
|
stack
|
page read and write
|
||
122F000
|
heap
|
page read and write
|
||
54DD000
|
stack
|
page read and write
|
||
5710000
|
heap
|
page read and write
|
||
1545000
|
heap
|
page read and write
|
||
5732000
|
heap
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
3F21000
|
trusted library allocation
|
page read and write
|
||
13FA000
|
trusted library allocation
|
page execute and read and write
|
||
5690000
|
direct allocation
|
page read and write
|
||
37FE000
|
stack
|
page read and write
|
||
133E000
|
stack
|
page read and write
|
||
1060000
|
heap
|
page read and write
|
||
557E000
|
stack
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
AE0000
|
unkown
|
page readonly
|
||
13C0000
|
trusted library allocation
|
page read and write
|
||
13F0000
|
trusted library allocation
|
page read and write
|
||
1217000
|
heap
|
page read and write
|
||
5CF0000
|
trusted library section
|
page read and write
|
||
5670000
|
direct allocation
|
page read and write
|
||
5CEF000
|
stack
|
page read and write
|
||
37BE000
|
stack
|
page read and write
|
||
55BE000
|
stack
|
page read and write
|
||
13D3000
|
trusted library allocation
|
page execute and read and write
|
||
5702000
|
heap
|
page read and write
|
||
56F6000
|
heap
|
page read and write
|
||
160F000
|
heap
|
page read and write
|
||
158A000
|
heap
|
page read and write
|
||
13D4000
|
trusted library allocation
|
page read and write
|
||
36BE000
|
stack
|
page read and write
|
||
2F75000
|
trusted library allocation
|
page read and write
|
||
5C4F000
|
direct allocation
|
page read and write
|
||
3F89000
|
trusted library allocation
|
page read and write
|
||
155D000
|
stack
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
5C4F000
|
direct allocation
|
page read and write
|
||
56C8000
|
heap
|
page read and write
|
||
2F78000
|
trusted library allocation
|
page read and write
|
||
5681000
|
direct allocation
|
page read and write
|
||
15C0000
|
trusted library allocation
|
page read and write
|
||
4FFC000
|
stack
|
page read and write
|
||
1750000
|
heap
|
page read and write
|
||
1740000
|
trusted library allocation
|
page read and write
|
||
56E2000
|
heap
|
page read and write
|
||
573A000
|
heap
|
page read and write
|
||
5A6E000
|
stack
|
page read and write
|
||
B8C000
|
stack
|
page read and write
|
||
5732000
|
heap
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
56E5000
|
heap
|
page read and write
|
||
3F29000
|
trusted library allocation
|
page read and write
|
||
571F000
|
heap
|
page read and write
|
||
1067000
|
heap
|
page read and write
|
||
56DD000
|
heap
|
page read and write
|
||
157C000
|
heap
|
page read and write
|
||
1075000
|
heap
|
page read and write
|
||
39DC000
|
trusted library allocation
|
page read and write
|
||
99D000
|
stack
|
page read and write
|
||
572D000
|
heap
|
page read and write
|
||
1756000
|
heap
|
page read and write
|
||
2F83000
|
trusted library allocation
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
5735000
|
heap
|
page read and write
|
||
570E000
|
heap
|
page read and write
|
||
397F000
|
stack
|
page read and write
|
||
55C5000
|
heap
|
page read and write
|
||
1609000
|
heap
|
page read and write
|
||
135F000
|
stack
|
page read and write
|
||
2F7D000
|
trusted library allocation
|
page read and write
|
||
13E0000
|
trusted library allocation
|
page read and write
|
||
357E000
|
stack
|
page read and write
|
||
5727000
|
heap
|
page read and write
|
||
1402000
|
trusted library allocation
|
page read and write
|
||
125E000
|
stack
|
page read and write
|
||
12FB000
|
stack
|
page read and write
|
||
56E4000
|
heap
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
3A80000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
2ECD000
|
stack
|
page read and write
|
||
56FD000
|
heap
|
page read and write
|
||
118A000
|
heap
|
page read and write
|
||
343D000
|
stack
|
page read and write
|
||
56C0000
|
heap
|
page read and write
|
||
5725000
|
heap
|
page read and write
|
||
56F2000
|
heap
|
page read and write
|
||
F0B000
|
stack
|
page read and write
|
||
56FA000
|
heap
|
page read and write
|
||
5C40000
|
direct allocation
|
page read and write
|
||
5735000
|
heap
|
page read and write
|
||
5BE0000
|
direct allocation
|
page read and write
|
||
117E000
|
stack
|
page read and write
|
||
56E1000
|
heap
|
page read and write
|
||
155A000
|
heap
|
page read and write
|
||
1570000
|
trusted library allocation
|
page execute and read and write
|
||
5739000
|
heap
|
page read and write
|
||
564D000
|
direct allocation
|
page read and write
|
||
2F8B000
|
trusted library allocation
|
page read and write
|
||
596E000
|
stack
|
page read and write
|
||
15E2000
|
heap
|
page read and write
|
||
5C80000
|
direct allocation
|
page read and write
|
||
15E0000
|
heap
|
page read and write
|
||
AE2000
|
unkown
|
page readonly
|
||
A9C000
|
stack
|
page read and write
|
||
5AAE000
|
stack
|
page read and write
|
||
5BC0000
|
heap
|
page read and write
|
||
2FFF000
|
stack
|
page read and write
|
||
3980000
|
trusted library allocation
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
39BC000
|
trusted library allocation
|
page read and write
|
||
5BBF000
|
stack
|
page read and write
|
||
5722000
|
heap
|
page read and write
|
||
1400000
|
trusted library allocation
|
page read and write
|
||
5676000
|
direct allocation
|
page read and write
|
||
572F000
|
stack
|
page read and write
|
||
1570000
|
heap
|
page read and write
|
||
146E000
|
stack
|
page read and write
|
||
5CC0000
|
direct allocation
|
page read and write
|
||
56F7000
|
heap
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
11B5000
|
heap
|
page read and write
|
||
59BF000
|
stack
|
page read and write
|
||
572C000
|
heap
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
There are 198 hidden memdumps, click here to show them.